CVE-2023-52890
Description
NTFS-3G before 75dcdc2 has a use-after-free in ntfs_uppercase_mbs in libntfs-3g/unistr.c. NOTE: discussion suggests that exploitation would be challenging.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
NTFS-3G before commit 75dcdc2 has a use-after-free in ntfs_uppercase_mbs() when utf8_to_unicode() fails, potentially leading to memory corruption.
A use-after-free vulnerability exists in NTFS-3G's ntfs_uppercase_mbs() function in libntfs-3g/unistr.c, affecting versions prior to commit 75dcdc2. The bug occurs when utf8_to_unicode() returns -1, indicating a conversion failure. In the code path, after failing, the function frees the upp buffer and sets it to NULL. However, immediately afterward, the code attempts to dereference t (which is equal to upp) to write a null byte (*t = 0;), resulting in a write to freed memory [1].
The vulnerability is triggered when processing malformed UTF-8 input that causes the conversion routine to fail. An attacker would need to provide a specially crafted filesystem image or induce an error while mounting or manipulating NTFS volumes, which may require local access or the ability to mount a malicious volume. The exploitation prerequisites are specific and the discussion notes that achieving arbitrary code execution would be challenging [1].
If exploited, the use-after-free could lead to memory corruption, potentially causing a crash or other undefined behavior. Although the impact is rated as Medium (CVSS v3.1 4.5) due to the difficulty of exploitation, it could be leveraged in certain scenarios to escalate privileges or achieve denial of service.
The issue was addressed in commit 75dcdc2, which removes the problematic *t = 0; statement. Users are advised to update NTFS-3G to the latest version or apply the patch [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9- osv-coords8 versionspkg:rpm/opensuse/ntfs-3g_ntfsprogs&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/ntfs-3g_ntfsprogs&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/ntfs-3g_ntfsprogs&distro=openSUSE%20Tumbleweedpkg:rpm/suse/ntfs-3g_ntfsprogs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/ntfs-3g_ntfsprogs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/ntfs-3g_ntfsprogs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/ntfs-3g_ntfsprogs&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/ntfs-3g_ntfsprogs&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5
< 2022.5.17-150000.3.21.1+ 7 more
- (no CPE)range: < 2022.5.17-150000.3.21.1
- (no CPE)range: < 2022.5.17-150000.3.21.1
- (no CPE)range: < 2022.10.3-4.1
- (no CPE)range: < 2022.5.17-150000.3.21.1
- (no CPE)range: < 2022.5.17-150000.3.21.1
- (no CPE)range: < 2022.5.17-5.20.1
- (no CPE)range: < 2022.5.17-5.20.1
- (no CPE)range: < 2022.5.17-150000.3.21.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.